Information about XMLParser.x32

XMLParser.x32

XMLParser.x32 is a Windows file recorded in the ThreatInfo database. It is associated with Director 8.5 Shockwave Studio. The reported company name is Macromedia, Inc.. The current detection status is Undefined, based on the latest analysis from 2021-12-31 21:10:14 (4 years ago).

ThreatInfo does not have a final classification for this file yet. Use the technical details below to compare the hash, size, signature, and observed locations with the copy found on your device.

Product Name: Director 8.5 Shockwave Studio
Company Name: Macromedia, Inc.
MD5: 88b1dbf413a7978b20a6114bed984c5b
Size: 164 KB
First Published: 2021-12-31 21:10:14 (4 years ago)
Latest Published: 2021-12-31 21:10:14 (4 years ago)
Status: Undefined (on last analysis)
Analysis Date: 2021-12-31 21:10:14 (4 years ago)
%programfiles%\zona\lsdictionaryen-mk\xtras

ThreatInfo has observed XMLParser.x32 in the locations listed above. Files found in temporary folders, user profile folders, startup locations, or unusual application directories should be reviewed more carefully than files installed under a known program directory.

100.0%

The strongest geographic signal for this file is Macedonia with 100.0% of observed hits. Geographic distribution can help identify targeted campaigns, regional software bundles, or where a file is most commonly reported.

Windows 7 100.0%

The most common operating system signal for XMLParser.x32 is Windows 7 with 100.0% of observed hits. If your system differs from the common profile, check whether the file was introduced by a specific installer, archive, or removable device.

XMLParser.x32 is identified as pe for 32 systems. The subsystem is Windows GUI. PE header values are useful for triage, especially when they do not match the expected publisher, product, or release timeline.

Subsystem: Windows GUI
PE Type: pe
OS Bitness: 32
Image Base: 0x6d0c0000
Entry Address: 0x00014da7

PE Sections:

Name Size of data MD5
.text 81920 38a041d6aac23d40312ae50c4dcd2620
.rdata 32768 498757204b79abe4220729b7100f53d3
.data 40960 ab46552487c172dcd9af139b2596fd45
.rsrc 4096 ed366aaee549ed32cb0bef5888d780cb
.reloc 4096 a25551817baefc377cc7a5197af527bc

PE section names and hashes can reveal packing, injected resources, or unusual build artifacts. Sections with uncommon names, very large raw data, or hashes that differ from a trusted copy deserve additional review.

More information: